feat(hos_client_create, hos_client_destory): 多次调用destory不会导致重复释放

This commit is contained in:
彭宣正
2020-12-14 17:24:58 +08:00
parent 505d529c32
commit 10b370e486
55976 changed files with 8544395 additions and 2 deletions

View File

@@ -0,0 +1,160 @@
/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#pragma once
#include <aws/acm/ACM_EXPORTS.h>
#include <aws/acm/ACMRequest.h>
#include <aws/core/utils/memory/stl/AWSString.h>
#include <aws/acm/model/CertificateOptions.h>
#include <utility>
namespace Aws
{
namespace ACM
{
namespace Model
{
/**
*/
class AWS_ACM_API UpdateCertificateOptionsRequest : public ACMRequest
{
public:
UpdateCertificateOptionsRequest();
// Service request name is the Operation name which will send this request out,
// each operation should has unique request name, so that we can get operation's name from this request.
// Note: this is not true for response, multiple operations may have the same response name,
// so we can not get operation's name from response.
inline virtual const char* GetServiceRequestName() const override { return "UpdateCertificateOptions"; }
Aws::String SerializePayload() const override;
Aws::Http::HeaderValueCollection GetRequestSpecificHeaders() const override;
/**
* <p>ARN of the requested certificate to update. This must be of the form:</p> <p>
* <code>arn:aws:acm:us-east-1:<i>account</i>:certificate/<i>12345678-1234-1234-1234-123456789012</i>
* </code> </p>
*/
inline const Aws::String& GetCertificateArn() const{ return m_certificateArn; }
/**
* <p>ARN of the requested certificate to update. This must be of the form:</p> <p>
* <code>arn:aws:acm:us-east-1:<i>account</i>:certificate/<i>12345678-1234-1234-1234-123456789012</i>
* </code> </p>
*/
inline bool CertificateArnHasBeenSet() const { return m_certificateArnHasBeenSet; }
/**
* <p>ARN of the requested certificate to update. This must be of the form:</p> <p>
* <code>arn:aws:acm:us-east-1:<i>account</i>:certificate/<i>12345678-1234-1234-1234-123456789012</i>
* </code> </p>
*/
inline void SetCertificateArn(const Aws::String& value) { m_certificateArnHasBeenSet = true; m_certificateArn = value; }
/**
* <p>ARN of the requested certificate to update. This must be of the form:</p> <p>
* <code>arn:aws:acm:us-east-1:<i>account</i>:certificate/<i>12345678-1234-1234-1234-123456789012</i>
* </code> </p>
*/
inline void SetCertificateArn(Aws::String&& value) { m_certificateArnHasBeenSet = true; m_certificateArn = std::move(value); }
/**
* <p>ARN of the requested certificate to update. This must be of the form:</p> <p>
* <code>arn:aws:acm:us-east-1:<i>account</i>:certificate/<i>12345678-1234-1234-1234-123456789012</i>
* </code> </p>
*/
inline void SetCertificateArn(const char* value) { m_certificateArnHasBeenSet = true; m_certificateArn.assign(value); }
/**
* <p>ARN of the requested certificate to update. This must be of the form:</p> <p>
* <code>arn:aws:acm:us-east-1:<i>account</i>:certificate/<i>12345678-1234-1234-1234-123456789012</i>
* </code> </p>
*/
inline UpdateCertificateOptionsRequest& WithCertificateArn(const Aws::String& value) { SetCertificateArn(value); return *this;}
/**
* <p>ARN of the requested certificate to update. This must be of the form:</p> <p>
* <code>arn:aws:acm:us-east-1:<i>account</i>:certificate/<i>12345678-1234-1234-1234-123456789012</i>
* </code> </p>
*/
inline UpdateCertificateOptionsRequest& WithCertificateArn(Aws::String&& value) { SetCertificateArn(std::move(value)); return *this;}
/**
* <p>ARN of the requested certificate to update. This must be of the form:</p> <p>
* <code>arn:aws:acm:us-east-1:<i>account</i>:certificate/<i>12345678-1234-1234-1234-123456789012</i>
* </code> </p>
*/
inline UpdateCertificateOptionsRequest& WithCertificateArn(const char* value) { SetCertificateArn(value); return *this;}
/**
* <p>Use to update the options for your certificate. Currently, you can specify
* whether to add your certificate to a transparency log. Certificate transparency
* makes it possible to detect SSL/TLS certificates that have been mistakenly or
* maliciously issued. Certificates that have not been logged typically produce an
* error message in a browser. </p>
*/
inline const CertificateOptions& GetOptions() const{ return m_options; }
/**
* <p>Use to update the options for your certificate. Currently, you can specify
* whether to add your certificate to a transparency log. Certificate transparency
* makes it possible to detect SSL/TLS certificates that have been mistakenly or
* maliciously issued. Certificates that have not been logged typically produce an
* error message in a browser. </p>
*/
inline bool OptionsHasBeenSet() const { return m_optionsHasBeenSet; }
/**
* <p>Use to update the options for your certificate. Currently, you can specify
* whether to add your certificate to a transparency log. Certificate transparency
* makes it possible to detect SSL/TLS certificates that have been mistakenly or
* maliciously issued. Certificates that have not been logged typically produce an
* error message in a browser. </p>
*/
inline void SetOptions(const CertificateOptions& value) { m_optionsHasBeenSet = true; m_options = value; }
/**
* <p>Use to update the options for your certificate. Currently, you can specify
* whether to add your certificate to a transparency log. Certificate transparency
* makes it possible to detect SSL/TLS certificates that have been mistakenly or
* maliciously issued. Certificates that have not been logged typically produce an
* error message in a browser. </p>
*/
inline void SetOptions(CertificateOptions&& value) { m_optionsHasBeenSet = true; m_options = std::move(value); }
/**
* <p>Use to update the options for your certificate. Currently, you can specify
* whether to add your certificate to a transparency log. Certificate transparency
* makes it possible to detect SSL/TLS certificates that have been mistakenly or
* maliciously issued. Certificates that have not been logged typically produce an
* error message in a browser. </p>
*/
inline UpdateCertificateOptionsRequest& WithOptions(const CertificateOptions& value) { SetOptions(value); return *this;}
/**
* <p>Use to update the options for your certificate. Currently, you can specify
* whether to add your certificate to a transparency log. Certificate transparency
* makes it possible to detect SSL/TLS certificates that have been mistakenly or
* maliciously issued. Certificates that have not been logged typically produce an
* error message in a browser. </p>
*/
inline UpdateCertificateOptionsRequest& WithOptions(CertificateOptions&& value) { SetOptions(std::move(value)); return *this;}
private:
Aws::String m_certificateArn;
bool m_certificateArnHasBeenSet;
CertificateOptions m_options;
bool m_optionsHasBeenSet;
};
} // namespace Model
} // namespace ACM
} // namespace Aws